CVE-2024-13281

9.1 CRITICAL

📋 TL;DR

This CVE describes an incorrect authorization vulnerability in Drupal's Monster Menus module that allows forceful browsing (unauthorized access to restricted pages). Attackers can bypass access controls to view or interact with content they shouldn't have permission to access. This affects all Drupal sites using vulnerable versions of the Monster Menus module.

💻 Affected Systems

Products:
  • Drupal Monster Menus module
Versions: 0.0.0 through 9.3.1
Operating Systems: All operating systems running Drupal
Default Config Vulnerable: ⚠️ Yes
Notes: Any Drupal site with Monster Menus module enabled is vulnerable. The vulnerability exists in the module's access control logic.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to the Drupal site, modify content, install malicious modules, or exfiltrate sensitive user data.

🟠

Likely Case

Unauthorized users access restricted content pages, user profiles, or administrative interfaces they shouldn't have permission to view.

🟢

If Mitigated

Limited exposure of non-critical restricted content if proper network segmentation and additional authentication layers are in place.

🌐 Internet-Facing: HIGH - Drupal sites are typically internet-facing, making them directly accessible to attackers worldwide.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this to escalate privileges within the Drupal environment.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some understanding of Drupal's menu system but doesn't require advanced technical skills. Attackers need at least some level of access to the site.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.3.2

Vendor Advisory: https://www.drupal.org/sa-contrib-2024-045

Restart Required: No

Instructions:

1. Log into Drupal admin panel. 2. Navigate to Extend > Update. 3. Check for available updates. 4. Update Monster Menus module to version 9.3.2 or higher. 5. Clear Drupal caches after update.

🔧 Temporary Workarounds

Disable Monster Menus module

all

Temporarily disable the vulnerable module until patching is possible

drush pm-disable monster_menus

Implement additional access controls

all

Add extra authentication or IP-based restrictions to sensitive menu items

🧯 If You Can't Patch

  • Disable the Monster Menus module immediately
  • Implement web application firewall rules to block suspicious menu access patterns

🔍 How to Verify

Check if Vulnerable:

Check Monster Menus module version in Drupal admin at Extend > Installed modules, or run: drush pm-list | grep monster_menus

Check Version:

drush pm-list --fields=name,version | grep monster_menus

Verify Fix Applied:

Verify Monster Menus module version is 9.3.2 or higher, or test that restricted menu items properly enforce access controls

📡 Detection & Monitoring

Log Indicators:

  • Multiple 403 errors followed by 200 successes for the same user on restricted paths
  • Unauthorized access attempts to admin menu items

Network Indicators:

  • Unusual patterns of requests to menu items that should be restricted

SIEM Query:

source="drupal_access_log" (status=200 AND uri CONTAINS "/admin/") AND user_role!="administrator"

🔗 References

📤 Share & Export